Your message dated Wed, 13 Aug 2008 12:32:05 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#494918: fixed in openvpn 2.1~rc9-2
has caused the Debian Bug report #494918,
regarding rc9 killed openvpn on amd64
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
494918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494918
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: openvpn
Version: 2.1~rc9-1
Severity: important
Here is the relevant log entries at verbose=9
--------------------------------------------------------------------------------
MTU DYNAMIC mtu=0, flags=1, 0 -> 166
TLS-Auth MTU parms [ L:1574 D:166 EF:66 EB:0 ET:0 EL:0 ]
MTU DYNAMIC mtu=1450, flags=2, 1574 -> 1450
TUN/TAP device tap1 opened
TUN/TAP TX queue length set to 100
ifconfig tap1 172.16.1.2 netmask 255.255.0.0 mtu 1500 broadcast 172.16.255.255
PKCS#11: __pkcs11h_forkFixup entry pid=18608, activate_slotevent=1
PKCS#11: __pkcs11h_forkFixup return
Linux ifconfig failed: could not execute external program
Exiting
---------------------------------------------------------------------------------
Unfortunately, the choice of restarting the tunnels on upgrade was
recently taken away - and thus the machine was unreachable until I was
able to be on-premises and downgrade.
The x86 clients don't seem to have the same issue
-- System Information:
Debian Release: lenny/sid
APT prefers testing-proposed-updates
APT policy: (500, 'testing-proposed-updates'), (500, 'proposed-updates'),
(500, 'oldstable'), (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1,
'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.25.10 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages openvpn depends on:
ii debconf [debconf-2.0] 1.5.23 Debian configuration management sy
ii libc6 2.7-13 GNU C Library: Shared libraries
ii liblzo2-2 2.03-1 data compression library
ii libpam0g 1.0.1-2 Pluggable Authentication Modules l
ii libpkcs11-helper1 1.05-1 library that simplifies the intera
ii libssl0.9.8 0.9.8g-13 SSL shared libraries
ii openssl-blacklist 0.4.2 list of blacklisted OpenSSL RSA ke
ii openvpn-blacklist 0.3 list of blacklisted OpenVPN RSA sh
Versions of packages openvpn recommends:
ii net-tools 1.60-19 The NET-3 networking toolkit
Versions of packages openvpn suggests:
ii openssl 0.9.8g-13 Secure Socket Layer (SSL) binary a
ii resolvconf 1.41 name server information handler
-- debconf information:
* openvpn/vulnerable_prng:
openvpn/change_init: false
openvpn/stop2upgrade: false
openvpn/default_port:
openvpn/change_init2: false
openvpn/create_tun: false
--- End Message ---
--- Begin Message ---
Source: openvpn
Source-Version: 2.1~rc9-2
We believe that the bug you reported is fixed in the latest version of
openvpn, which is due to be installed in the Debian FTP archive:
openvpn_2.1~rc9-2.diff.gz
to pool/main/o/openvpn/openvpn_2.1~rc9-2.diff.gz
openvpn_2.1~rc9-2.dsc
to pool/main/o/openvpn/openvpn_2.1~rc9-2.dsc
openvpn_2.1~rc9-2_i386.deb
to pool/main/o/openvpn/openvpn_2.1~rc9-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> (supplier of updated openvpn
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 13 Aug 2008 13:37:01 +0200
Source: openvpn
Binary: openvpn
Architecture: source i386
Version: 2.1~rc9-2
Distribution: unstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Changed-By: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Description:
openvpn - virtual private network daemon
Closes: 494918
Changes:
openvpn (2.1~rc9-2) unstable; urgency=low
.
* debian/rules: run ./configure with path to ifconfig, for
those build daemons without ifconfig. (Closes: #494918)
Checksums-Sha1:
17e43630fd9bd4cec63e06634ab2854f2add081a 1055 openvpn_2.1~rc9-2.dsc
ed389c72a3b62698d2c3b2b67d20d5e605f3ccf2 80504 openvpn_2.1~rc9-2.diff.gz
b01fa9daeeab3dfa90c7ee11a88970bc91feaf45 399738 openvpn_2.1~rc9-2_i386.deb
Checksums-Sha256:
08ac51e6ad887f3f6071287cad9383bc287aeab97982e04f6f5316402df73d97 1055
openvpn_2.1~rc9-2.dsc
44e1e3fa7ea75831d8f5fe99332689aa36fafe27efa6304271440afcf081cf27 80504
openvpn_2.1~rc9-2.diff.gz
5c6818f976d95d3a780a58ff701017e39b9a22df2ca63f24cb66352b3ca6ed14 399738
openvpn_2.1~rc9-2_i386.deb
Files:
be3e327534b4dc87c36fbe182ba3cee2 1055 net optional openvpn_2.1~rc9-2.dsc
44d3994b8826ab2722d496599b961538 80504 net optional openvpn_2.1~rc9-2.diff.gz
4267fddb59c0e5a98863d73b5ac2eb97 399738 net optional openvpn_2.1~rc9-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkiiyL8ACgkQxRSvjkukAcPxNwCg2+j6B5HG6uEWJ6bGxRjhbTHI
0/cAn1Cum0uv6CYQTcJBgX6bOME7DcP/
=PqOh
-----END PGP SIGNATURE-----
--- End Message ---